teleport-fips-17

Direct Vulnerabilities

Known vulnerabilities in the teleport-fips-17 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

<17.7.20-r1
  • L
CVE-2026-33810

<17.7.20-r1
  • M
Allocation of Resources Without Limits or Throttling

<17.7.20-r1
  • H
Incorrect Authorization

<17.7.20-r1
  • L
CVE-2026-32280

<17.7.20-r1
  • M
Link Following

<17.7.20-r1
  • H
Improper Certificate Validation

<17.7.20-r1
  • M
Cross-site Scripting (XSS)

<17.7.20-r1
  • H
CVE-2025-15558

*
  • L
Untrusted Search Path

*
  • L
CVE-2026-27142

<17.7.20-r0
  • L
CVE-2026-27139

<17.7.20-r0
  • L
CVE-2026-25679

<17.7.20-r0
  • M
Improper Validation of Integrity Check Value

<17.7.20-r0
  • C
CVE-2025-68121

<17.7.18-r0
  • L
CVE-2025-61732

<17.7.18-r0
  • L
Directory Traversal

*
  • H
Reachable Assertion

*
  • H
Improper Verification of Cryptographic Signature

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
NULL Pointer Dereference

*
  • M
Directory Traversal

*
  • L
Allocation of Resources Without Limits or Throttling

<17.7.15-r0
  • L
CVE-2025-61731

<17.7.15-r0
  • L
CVE-2025-61730

<17.7.15-r0
  • L
Allocation of Resources Without Limits or Throttling

<17.7.15-r0
  • L
Out-of-bounds Write

<17.7.15-r0
  • L
Allocation of Resources Without Limits or Throttling

<17.7.13-r0
  • L
Asymmetric Resource Consumption (Amplification)

*
  • L
Improper Certificate Validation

<17.7.10-r2
  • L
Improper Certificate Validation

<17.7.10-r2
  • L
CVE-2025-47914

<17.7.10-r1
  • L
CVE-2025-58181

<17.7.10-r1
  • M
Memory Leak

<17.7.9-r1
  • H
Incorrect Execution-Assigned Permissions

<17.7.9-r1
  • L
Information Exposure Through Log Files

<17.7.8-r1
  • L
CVE-2025-58186

<17.7.8-r1
  • L
Improper Certificate Validation

<17.7.8-r1
  • L
Allocation of Resources Without Limits or Throttling

<17.7.8-r1
  • L
Allocation of Resources Without Limits or Throttling

<17.7.8-r1
  • L
CVE-2025-58183

<17.7.8-r1
  • L
Allocation of Resources Without Limits or Throttling

<17.7.8-r1
  • L
CVE-2025-61725

<17.7.8-r1
  • L
CVE-2025-47912

<17.7.8-r1
  • L
Algorithmic Complexity

<17.7.8-r1
  • L
Reachable Assertion

<17.7.7-r1
  • L
CVE-2025-47910

<17.7.5-r0